veto cloud command manages authentication and context for Veto Cloud.
Syntax
Subcommands
login
Authenticate with Veto Cloud using device flow.whoami
Show active account and organization context.org use
Switch active organization.project use
Switch active project.logout
Clear local cloud session.Options
Base URL
JSON Output
Examples
Login
Check Current Context
Switch Organization
Switch Project
Logout
JSON Output
Authentication Methods
Device Flow (Default)
- CLI generates device code
- Opens browser to https://app.veto.so/device
- User enters code and approves
- CLI receives access token
- Token saved to
~/.veto/cloud-session.json
API Key (Alternative)
Session Storage
Location
Format
Security
- File is only readable by owner (chmod 600)
- Contains sensitive tokens - do not share
- Automatically refreshed when expired
Use Cases
Team Collaboration
Multi-Environment Workflow
CI/CD Authentication
Switching Between Accounts
Troubleshooting
Login Failed
Session Expired
Organization Not Found
Network Issues
Best Practices
1. Use Device Flow for Development
2. Use API Keys for CI/CD
3. Never Commit Credentials
4. Rotate Keys Regularly
5. Use Project Context
Environment Variables
VETO_API_KEY
API key for authentication (takes precedence over device flow).VETO_API_URL
Override cloud API base URL.Next Steps
- Apply Policies to Cloud - Deploy policies
- Generate Policies - Create cloud policies
- Run Doctor - Verify cloud connectivity
- Guard Check in Cloud - Test against cloud rules

